TechNet Augusta 2023 Sponsorship Opportunities
AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.
Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.
The deadline to purchase sponsorships was July 14th. Sponsorships for TechNet Augusta 2023 have now closed.
Visit the AFCEA YouTube Channel for event recordings. Click here to access.
Wednesday, August 02, 11:00 AM - 12:00 PM
Register now
(One registration provides access to both webinars)
1. Data-Driven Decision Making: Data literacy empowers military leaders to base decisions on evidence rather than assumptions. By analyzing historical and real-time data, commanders can assess risks, allocate resources efficiently, and develop effective strategies. Data-driven decision-making enhances operational effectiveness and minimizes uncertainties, enabling commanders to utilize their experiences while adding an extra value of data to accomplish these tasks.
2. Situational Awareness: Data literacy helps military personnel develop a comprehensive understanding of the operational environment. By analyzing various data sources, such as intelligence reports, sensor data, and historical records personnel can gain insights into...
...read more...
Speaker(s)
Tracks:
Thursday, August 03, 11:00 AM - 12:00 PM
Register now
(One registration provides access to both webinars)
Take a tour of the Army’s Cyber Corps operations in cyberspace and what it takes to build a specialized workforce. The military occupation specialties (MOSs) within CMF 17 are unique and more technical than most of the Army’s other MOSs.
Learn about the ongoing efforts to recruit the necessary talent into the Cyber Corps to be the most effective and dominating cyber force in the world. Recruitment is straightforward and one of the Army’s big focuses. Acquiring new talent is an art form and the Army is going to great lengths to ensure it is bringing in the right skills and...
...read more...
Speaker(s)
Tracks:
Sunday, August 13, 1:00 PM - 4:00 PM
- Room: Olmstead Street Level Foyer
Monday, August 14, 7:30 AM - 4:30 PM
- Room: Olmstead Street Level Foyer
Monday, August 14, 8:00 AM - 9:00 AM
Driven by the Biden Administrations executive order (EO) on Improving the Nation's Cybersecurity as well as agency data strategies and department-level modernization efforts, programs across the Federal Government have recognized the tremendous potential of data and the application of analytics to improve decision-making. At the same time, organizations are facing significant threats, ranging from ransomware attacks to state-sponsored espionage, that are only exacerbated with the shift to the cloud and remote work. An architecture informed by Zero Trust principles is necessary to ensure that data and systems can be protected from malicious actors, and a centralized data access control plane...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 9:30 AM - 10:30 AM
In this briefing on practical AI for Cyber Operations, Stephen Scarbrough from IntelliGenesis LLC, shares his expertise on how AI can be utilized to improve cybersecurity. Scarbrough discusses the benefits and limitations of AI in cyber operations and provides insights on selecting the right algorithms and techniques for specific use cases. He also emphasizes the importance of data quality and data management in the success of AI-based solutions.
Through real-world examples and case studies, Scarbrough highlights how AI can enhance threat detection, response, and mitigation. Overall, the briefing provides valuable insights for organizations looking to leverage AI in their cybersecurity strategy.
Listen...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 10:30 AM - 5:00 PM
- Room: Gordon Lakes Golf Course
CLICK HERE for details, sponsorships, and registration...
Tracks:
Monday, August 14, 11:00 AM - 12:00 PM
In this session Stephen Scarbrough from IntelliGenesis sheds light on the increasing vulnerability of Industrial Control Systems (ICS) to cyber-attacks. Scarbrough emphasizes that ICS are critical components of various industries such as energy, transportation, and manufacturing, and a successful cyber-attack on these systems can have catastrophic consequences to mission success. Mr. Scarbrough discusses the unique challenges in securing ICS and shares his insights on how organizations can improve their defense mechanisms.
Through real-world examples and case studies, he will highlight the potential impact of a cyber-attack on ICS and the need for proactive measures to mitigate this threat. Overall, the briefing...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 1:00 PM - 2:00 PM
Before you can explore the many ways in which Artificial Intelligence (AI) can be transformative within cybersecurity, you need to grasp what AI is and is not. In this session, we will define AI, the types of AI, and the various approaches - providing a framework for understanding the practical implications of AI within cybersecurity. At the end of the session, you will be able to identify the concepts that are foundational to AI and major high-level approaches to machine learning and deep learning and how it is being used to transform the technology we are using in our lines...
...read more...
Speaker(s)
Tracks:
The definition of Identity, Credential, and Access Management (ICAM) talks to the tools, processes, and policies to determine the right individual can access the right resource, at the right time, for the right reason, to complete their objective. To achieve this, solutions need agile deployment options, and flexible integration pathways.
Purpose:
Hear from ICAM leaders on ways to ensure success within and beyond your organization's boundary, for both internal and external users, across the many environments where your organization needs to deliver mission excellence.
Topics of Discussion:
What a modern, centralized ICAM architecture actually means
ICAM approach for DDIL/Tactical ICAM (TICAM)
Working with external partners, and the role...
...read more...
Speaker(s)
Tracks:
Handout(s)
Monday, August 14, 1:00 PM - 4:00 PM
The Security Operations Suite Hands-On is a modular, hands-on workshop designed to familiarize participants with how to investigate incidents using Splunk Enterprise, Enterprise Security, UBA and Phantom. This workshop provides users an opportunity to walk through multiple scenarios and see first-hand how Splunk Security Products can be used to take notable events and investigate, hunt and orchestrate actions based on what is uncovered. The workshop leverages the popular Boss of the SOC (BOTS) dataset and is laid out in an interactive format. Users will leave with a better understanding of how Splunk, Enterprise Security, UBA and Phantom can be used...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 2:00 PM - 5:00 PM
Monday, August 14, 2:30 PM - 3:30 PM
For over a decade the Department of Defense (DoD) has been trying to increase the cyber security capability of its contractors. That effort, now in its fifth iteration, has included mandated improvements in computer security controls as well as in after the fact forensic analysis of cyber incidents.
This presentation examines the current state of the computer security requirements that have been imposed on contractors to protect Controlled Unclassified Information, what constitutes a cyber incident, a contractor's duties for forensically analyzing and reporting a cyber incident, and finally, it examines what is missing from the entire program that will keep it...
...read more...
Speaker(s)
Tracks:
Handout(s)
As the technology dependence of our nation continues to grow exponentially the ability to protect citizens, critical infrastructure and the vast amount of data requires a prepared and agile cybersecurity workforce. The ability to collect and interpret large amounts of data is critical. Open-Source Intelligence gathering or the ability to gather intelligence through publicly available data and social media is highly effective. While analyst often have access to tremendous amounts of data, their ability to interpret can be significantly negatively impacted if the analyst only speaks and read English. ...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 4:00 PM - 5:00 PM
The DoD is implementing a Cybersecurity Maturity Model Certification (CMMC) that offers a consistent roadmap for the Defense Industrial Base (DIB), and beyond, to mature its overall Cybersecurity capabilities in a proactive way to enhance their business case, protect their brand, while protecting our Nation’s Economy and Security. The CMMC ecosystem consists of various organizations managed and coordinated by the CyberAB and the Cybersecurity Assessor and Instructor Certification Organization (CAICO), they currently include:
Organizations Seeking Compliance (OSC)
CMMC Third-Party Assessment Organizations (C3PAO)
Provisional Assessors/ Certified CMMC Professionals/ Certified CMMC Assessors
Registered Practitioner Organization (RPO)
Registered Practitioner (RP)/ Registered Practitioner Advanced (RPA)
Licensed Publishing Partners (LPPs)/ Licensed...
...read more...
Speaker(s)
Tracks:
Handout(s)
The rapid advancement of artificial intelligence (AI) has revolutionized numerous industries, but it has also brought forth significant security concerns. As AI systems become more integrated into our daily lives, the need for robust security controls becomes increasingly crucial. This presentation explores the importance of security controls in the age of AI and highlights the challenges and potential solutions associated with ensuring the security and privacy of AI systems.
The rise of AI has introduced a new set of security vulnerabilities that must be addressed. AI systems rely on vast amounts of data, both personal and sensitive, which makes them attractive...
...read more...
Speaker(s)
Tracks:
Monday, August 14, 4:30 PM - 8:00 PM
- Room: Print Your Badge Station, 2nd Fl Above Main Lobby
Tuesday, August 15, 6:30 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Tracks:
Tuesday, August 15, 7:00 AM - 8:00 AM
- Room: Plaza Lobby & Riverwalk Hallway
Tracks:
Tuesday, August 15, 8:00 AM - 10:00 AM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 15, 8:00 AM - 2:00 PM
- Room: Barton Field, Fort Gordon
Tuesday, August 15, 9:30 AM - 11:30 AM
Tuesday, August 15, 9:30 AM - 5:30 PM
Tuesday, August 15, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center Virtual World/Virtual
The AFCEA CERTS Military/Collegiate CTF Competition is a 4-hour, jeopardy-Style competition for aspiring and seasoned cyber and cybersecurity professionals. This competition is a learning tool that will measure the participants current familiarity with various cybersecurity topics and will further sharpen the tools they have learned through education, training or self-learning. The CTF provides opportunities to share ideas amongst team members and with other teams, promoting the concept of continual learning for the Soldiers and students.
The Jeopardy-style CTF is similar to the actual Jeopardy game as the scoreboard looks like a Jeopardy board with different categories and point values. In this...
...read more...
Tracks:
Tuesday, August 15, 10:15 AM - 11:15 AM
This one-hour session will provide the audience with an overview of Cyber Quest, initial insights and outcomes of Cyber Quest 2023, and a short introduction to the projected focus areas and objectives for Cyber Quest 2024. Cyber Quest is an Army Futures Command led live experiment conducted in an operationally relevant environment with government and industry partners to: align industry research and development to Army capability development; explore industry innovations which inform Army Capability Managers/Network Cross-Functional Team capability requirements documents; and identify mature technologies for rapid acquisition and follow on experimentation to include Project Convergence.
Listen to recording...
Speaker(s)
Tracks:
- Room: Georgia Cyber Center Auditorium
Watch recording
EW:
The Army’s plan to develop and employ integrated EW capabilities that provide ground commanders at all echelons with the ability to see itself, see the adversary, and affect the adversary in the EMS. The EW Ecosystem is interdependent with the Mission Command, Fires, Air Defense, Protection, Maneuver and Intelligence ecosystems spanning the terrestrial, aerial, stratosphere, and space layers. The overall objective is to develop EW capabilities that serve as a force multiplier to counter extant and emerging threats, while taking advantage of opportunities to detect, deny, deceive, disrupt, degrade, and destroy electromagnetic spectrum capabilities upon which our adversaries rely;...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, August 15, 10:30 AM - 10:50 AM
Enabling JADC2 through Secure Data Security
The Department of Defense (DoD) has recently published the Joint All-Domain Command and Control (JADC2) strategy which urgently calls for a focused push to empower our Joint Force Commanders with the capabilities needed to command the force across all warfighting domains and throughout the electromagnetic spectrum to deter, and, if necessary, defeat any adversary at any time and in any place around the globe. The strategy defines six different lines of effort (LOE) including the establishment of the JADC2 Data Enterprise and to modernize Mission Partner Information Sharing. To successfully enable these two LOEs, the...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 10:30 AM - 11:30 AM
Enabling a data centric Army requires a culture shift in how the Army deploys cyber capabilities for its forces. Warfighters must have access to critical data for mission success, and deploying network technology across multiple classification levels, like unclassified NIPRNet, secret SIPRNet, or top secret JWICS, as well as large computing and storage capability to process data is the mission of Cyber and Signal leaders.
However, successfully operating with agility and within a contested cyber domain requires fully embracing the tenants of zero trust to access applications and data that are moved into the cloud from anywhere on the globe. Zero trust...
...read more...
Speaker(s)
Tracks:
Handout(s)
This panel discussion features speakers from the Office of the Department of Defense (DoD) Chief Information Officer (CIO) and several leading cybersecurity certification bodies. Panelists will discuss how the cybersecurity workforce has evolved and is becoming more standardized. Attendees will learn about the DoD Cyber Workforce Framework (DCWF), the solutions it enables, and what the DoD and top certification bodies are doing to build the pipeline of both entry and specialized roles while incorporating real world skills into the cybersecurity workforce. You will learn and walk away with ideas on how the updated DoD 8140 mandate is poised to better prepare the Services...
...read more...
Speaker(s)
Tracks:
Data literacy plays a vital role in the modern military, enabling effective decision-making, enhanced operational efficiency, and improved strategic planning. By leveraging data effectively, the military can gain valuable insights, optimize resources, and use drive data driven decisions that allow commanders to make decisions in near real time. Below are a few topics of discussion on how we at the accomplish this.
1. Data-Driven Decision Making: Data literacy empowers military leaders to base decisions on evidence rather than assumptions. By analyzing historical and real-time data, commanders can assess risks, allocate resources efficiently, and develop effective strategies. Data-driven decision-making enhances operational effectiveness...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 11:00 AM - 11:20 AM
Solution Cloud adoption, implementation and migration while mandated by DOD and encouraged for both fiscal and security advantages is a significant disruptor for both operations and application teams. The challenges are amplified for the tactical-edge.
Through Peraton’s operations supporting the US Marine Corps we execute a hybrid-cloud to help the USMC achieve their goals for rapid migration and centralized command and control capabilities. Our partnership is in the early stages of commercial cloud enablement and migration although we have operated a private-cloud enterprise-level, primarily PaaS solution, for more than six years. Success in this environment required focus on ensuring our team...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 11:00 AM - 1:00 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Tuesday, August 15, 11:15 AM - 12:15 PM
- Room: Georgia Cyber Center Auditorium
Watch recording...
Speaker(s)
Tracks:
Tuesday, August 15, 11:30 AM - 11:50 AM
Today modern battlefield networks are increasingly responsible for not only voice communications but also large and varied data, including still images, video, sensor data, maps, situational awareness data, and inventory information. These networks must gather all that data, send it for analysis by remote compute resources, then distribute the fruits of that analysis back to the battlefield.
Unlike traditional military communications systems built for single channel voice-based command and control, 5G is designed to provide high-speed data connections to many devices and users simultaneously – it is not solely, or even primarily, about voice communications. It’s about acquiring and distributing intelligence,...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 12:00 PM - 12:20 PM
How do we survive and thrive in an ever-evolving digital battlefield? Short answer: We adapt! Incorporating new technology has proven to be the key to decisively winning and those who have failed to quickly and effectively adapt new technology have done so at their peril. History is littered with examples – Tanks in (WWI), Aircraft Carriers (WWII), GPS (Desert Storm) all have provided decisive advantages. Tomorrow’s leap in technology is all going to revolve around cyber battlefields. Specifically, who can sense threats to their digital systems and mitigate them quickly. The adage “Knowledge is power” has never been more prevalent...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 12:30 PM - 1:45 PM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Tuesday, August 15, 2:00 PM - 2:20 PM
VMware's suite of products, including NSX, Threat Prevention, and Multi-Cloud services, all with a zero-trust focus, offer a comprehensive solution to address the defined problems.
Bandwidth Limitations: VMware NSX optimizes network performance and bandwidth utilization with its software-defined networking (SDN) capabilities. Through smart routing, prioritization, and network virtualization, NSX ensures the efficient use and management of available bandwidth, thereby reducing the limitations at the tactical edge.
Hybrid Cloud Solutions: VMware's multi-cloud services leverage the power of VMware Cloud Foundation to simplify the deployment and operation of a hybrid cloud. This facilitates seamless and secure data exchange between cloud environments (Army, Commercial, or...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 2:00 PM - 3:00 PM
"Implementing Zero Trust Capabilities in Modern Architecture" is a 60-minute class designed to equip participants with the knowledge and skills required to implement Zero Trust security capabilities in today's network environments.
During this class, participants will explore the fundamental principles of Zero Trust and its significance in mitigating cyber risks. The class will emphasize the importance of identity and access management, micro-segmentation, and continuous monitoring as key components of a Zero Trust architecture.
Through practical examples, participants will gain insights into the core elements of implementing Zero Trust security. They will learn about the role of multifactor authentication, network segmentation, and encryption...
...read more...
Speaker(s)
Tracks:
Handout(s)
Training challenges with realistic test ranges, new technologies, and the need to operate in contested environments against peer competitors shape modern training. Electromagnetic spectrum usage, frequently shared with commercial applications, must support an increasing number of sensors and communications channels. Our panelists will discuss the approaches and challenges across the range of doctrine and capabilities to fight and win on near-future battlefields.
Listen to recording...
Speaker(s)
Discussion will be on how the EW course has advanced and the challenges ahead, and what the Cyber School is projecting with the MPTR.
Current Training Basics
RF Theory – Very Basic
Wi-Fi, Cellular, Other Communications
EW Math greatly expanded in the course
Fundament Electronics Course
Advanced Direction Finding
Software Defined Radios
How have they enhanced the training?
Building Projects
Leveraging the technology
EW Course Constraints
Location of training
Power levels used for training
Replicating all that is needed
1. Future of the Multipurpose Training Range (MPTR)
a) What will the space allow?
Complexity
Signal Masking
Terrain Challenges
b) How it will be used?
Tactical challenges
Cyber Integration Development and Testing
Unmanned Areal Systems
Urban Training
RF Refraction
Listen to recording...
Speaker(s)
Signal and Cyber capabilities and operations must evolve to enable the Army’s data-centric approach to Multi Domain Large Scale Combat Operations through a Unified Network while ensuring integration with Joint Forces and interoperability with Mission Partners. As the Army implements a data-centric, zero trust based unified network that extends from the enterprise to the tactical edge, defensive cyberspace operations and its enabling capabilities must also evolve. Senior Cyber and Signal warrant officers from across the Army discuss these issues and explore how industry partners can help.
Listen to recording...
Speaker(s)
Tracks:
Tuesday, August 15, 2:30 PM - 2:50 PM
With Compliance Essentials for Splunk (CE4S) organizations can now streamline continuous monitoring efforts, improve cybersecurity posture, and address the requirements of different National Institute of Standards and Technology (NIST)-based control frameworks, including the following: Risk Management Framework (RMF), Cybersecurity Maturity Model Certification (CMMC), Defense Federal Acquisition Regulation Supplement (DFARS) and the Office of Management (OMB) M-21-31 MEMORANDUM.
CE4S provides turn-key Dashboards that align with NIST Cyber Security Framework. Organizations can utilize their existing Splunk infrastructure to provide a low-effort path to operationalizing data for information security compliance visibility....
Speaker(s)
Tracks:
Tuesday, August 15, 3:00 PM - 4:30 PM
- Room: Oglethorpe Ballroom A-E
Watch recording
As the future of Warfare evolves, so do we. We’re accelerating our decision-support systems with the right data at the right time for our Soldiers in the field and our Commanders at the controls with unified networks and Data Mesh. We’re innovating on our capabilities towards fully autonomous vehicles and elevating our performance with AI/ML. We’re protecting and reinforcing our National Security with Cyber Security for both the offensive and defensive mindset.
Digital transformation underpins our efforts to build and deliver the Army of 2030 and beyond. These are the initiatives that will enable the Army’s transition to a multidomain...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 3:30 PM - 5:30 PM
Tuesday, August 15, 4:30 PM - 5:30 PM
Securing today’s data-centric battlefield is increasingly difficult due to rapid advancements in Artificial Intelligence/Machine Learning (AI/ML) model and data poisoning attacks. As data privacy is threatened by these new self-learning and automated threat vectors, the Army must stand ready to defend itself with secure cyber defense measures. This panel will explore how AI/ML can be used to counter these threats as well as architectures and software tools for best handling sensitive data in theatre, in networks, and on the Cloud. The learning objective is for attendees to become familiar with generative AI and large language models, as well as AI-based...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 4:40 PM - 5:00 PM
The Army has a strong desire to become a data-centric agency. This is a clear strategy that is described by all levels within the chain of command. The awareness of the importance of data and its role as a strategic asset is a critical driver of the overall roadmap across the Army Enterprise. Within that roadmap is the requirement that mission-critical data be interoperable and accessible for all strategic and tactical programs, including disrupted, disconnected, intermittent and low-bandwidth (DDIL), tactical edge, and enterprise cloud environments. An emerging approach to becoming data-centric is to treat data as a first-class citizen within...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 5:10 PM - 5:30 PM
The Department of Defense maintains millions of mission-critical data sets, many duplicative in nature, silo’ed within agencies and departments. Today’s threats are forming and exercised, at a speed never before seen. Commanders need access to the right information at the speed of relevance. Unfortunately, the information stored in these multiple systems is hard to access, and in some cases, unknown to the decision-maker.
In order to solve this issue, data must be democratized, discoverable, and made securely available to the people that need it at the moment it is needed. Past attempts at large dataware houses and data lakes have resulted...
...read more...
Speaker(s)
Tracks:
Tuesday, August 15, 5:30 PM - 7:00 PM
Wednesday, August 16, 7:00 AM - 9:00 AM
- Room: Plaza Lobby & Riverwalk Hallway
Tracks:
Wednesday, August 16, 7:00 AM - 6:00 PM
- Room: Olmstead Street Level Foyer
Wednesday, August 16, 8:00 AM - 9:00 AM
Cybersecurity and Infrastructure Security Agency: Region IV covers Alabama, Florida, Georgia, Kentucky, Mississippi, North Carolina, South Carolina, and Tennessee.
As the CSA, Klint is the liaison between Federal services and State, Local, territorial and Tribal Governments, Critical Infrastructure and Private Industry.
He serves as the focal point for communication to promote Cyber Preparedness, incident response, risk mitigation and situational awareness. He provides direct coordination, outreach, and regional support in order to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s Critical Infrastructure and Key Resources (CIKR) and State, Local, Territorial, and Tribal (SLTT) governments Mr. Walker has previously held positions...
...read more...
Speaker(s)
Tracks:
Handout(s)
The CCOE remains a critical partner in developing concepts and DOTMLPF-P integration for Information Advantage. In coordination with the MCCOE, the CCOE is contributing to the Information Campaign of Learning to validate the ADP 3-13 draft, refine the Operations and Organization (O&O) for the Theater Information Advantage Detachment (TIAD), and inform the Information Systems Information Dimension Initial Capabilities Document (ID-IS ICD). Assessments from PACIFIC Sentry 23 will inform products over the next several months and set conditions for AVENGER TRIAD 24 planning efforts.
Listen to recording...
Speaker(s)
While we are conducting multiple experiments during this Talisman Sabre, the one key highlight is the Mission Partner Environment. This network ties Australian Secret and US Secret networks together through a Common Services Hub that creates the REL FVEY Network. This common services hub provides services such as chat, voice, video, email, SharePoint, position location indicators, and a common operating picture. What makes this unique compared to the previous 10 Talisman Sabre exercises is that this network will be enduring. It will keep the US and AUS connected into perpetuity. We will also replicate this model throughout the Pacific as...
...read more...
Speaker(s)
Data literacy plays a vital role in the modern military, enabling effective decision-making, enhanced operational efficiency, and improved strategic planning. By leveraging data effectively, the military can gain valuable insights, optimize resources, and use drive data driven decisions that allow commanders to make decisions in near real time. Below are a few topics of discussion on how we at the accomplish this.
1. Data-Driven Decision Making: Data literacy empowers military leaders to base decisions on evidence rather than assumptions. By analyzing historical and real-time data, commanders can assess risks, allocate resources efficiently, and develop effective strategies. Data-driven decision-making enhances operational effectiveness...
...read more...
Speaker(s)
Tracks:
Wednesday, August 16, 9:15 AM - 10:15 AM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Wednesday, August 16, 9:30 AM - 11:00 AM
The United States faces numerous national security threats daily as they modernize the military capabilities for the future force. The Department of Defense requires the ability to acquire technology through non-traditional means from industry.
Attendees will learn about how xTech connects the Army with businesses through prize competitions, breaking down traditional barriers to working with the Army. Bringing these groups together not only spurs innovation and accelerates technology development for the Army but provides businesses a unique collaboration opportunity. They will also learn about the Army Small Business Innovation Research (SBIR) and the Small Business Technology Transfer (STTR) Programs aligning...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 9:30 AM - 11:30 AM
Wednesday, August 16, 10:00 AM - 2:00 PM
- Room: Georgia Cyber Center Virtual World/Virtual
The High School/Middle School Capture the Flag will be a Jeopardy-style event. Schools from the Central Savannah River Area (CSRA) will compete, highlighting their skills, resiliency, and achievements. Topics covered for this event will include Binary Exploitation, Reverse Engineering, Web Exploitation, Cryptography, Forensics, and Security.
CLICK HERE for more information and to register a team.
Approved for 4 CompTIA CEU: A+, Network+, Security+, Linux+, and Cloud+; 4 GIAC CPE; 4 CertNexus CEC for CyberSec First Responder (CFR)
...
Tracks:
Wednesday, August 16, 10:00 AM - 4:00 PM
Wednesday, August 16, 10:30 AM - 10:50 AM
The speed of change in the joint contested environment is moving at a breakneck rate. With the introduction of multi-domain and AI assets along with traditional mission systems, this creates the impetus to drive the cloud resources to tactical edge faster than ever before. With this speed come new risk challenges. The hybrid cloud assets bring to the commander, leader and soldier definitive options to mediate this risk operating at the tactical edge and meet the mission needs with success.
Key to success of hybrid cloud delivery is not just an identity solution in the form of ICAM but more specifically...
...read more...
Speaker(s)
Tracks:
Wednesday, August 16, 10:30 AM - 11:30 AM
No situations are risk free! Implementing risk management is a key to good decision-making and is essential for strong cybersecurity.
Due to dependence on information technology, leaders in most fields need to understand cybersecurity vulnerabilities and mitigation options. Join our panel of ROTC cadets as they share their opinions on application of theoretical lessons in cybersecurity to risk management challenges and opportunities they might face in the military.
Questions for the panelists will include:
What lessons, either academic or experiential, have been most helpful in forming your concept of cybersecurity risk management?
What to you think is the nation's greatest cybersecurity threat?
Which concepts do...
...read more...
Speaker(s)
Tracks:
Talking points:
Current USCYBERCOM EA training strategy is impacting the ability to train CMF based on operational requirement
Current training path relies heavily on NSA to train personnel and trains to NSA TTPs
Over 60% of USCYBERCOM EA training requirements are missing from current training path
Training solution will
provide a progressive model developing USCYBERCOM basic, senior, and master EAs
provide flexibility to the Commanders to train personnel based on operational requirements.
Remove the heavy burden on the operational force to train USCYBERCOM TTPs to CMF personnel
Listen to recording
...
Speaker(s)
Tracks:
The Army’s premier technical experts must evolve in order to enable a data-centric Army. Force design updates, operational changes, new technologies, and the way we use current technologies will drive changes in Signal and Cyber warrant officer assignments, accession qualifications, skill requirements, and education. These changes will affect all three components: Regular Army, National Guard and Reserves. In this panel, Cyber Center of Excellence senior warrant officers discuss ongoing and upcoming initiatives that will impact warrant officer careers.
Listen to recording...
Speaker(s)
Tracks:
Wednesday, August 16, 10:45 AM - 11:15 AM
- Room: Georgia Cyber Center Auditorium
Watch recording
The Army is modernizing the network for Large Scale Combat Operations, informed by the war in Ukraine and the pacing threat in the Pacific. We are reducing network complexity at lower echelons; increasing speed and survivability through mobile command posts; reducing electronic signature; and improving interoperability with allies and partners. MG Jeth Rey, Director Network-CFT, and Mr. Mark Kitz, PEO C3T, will provide a joint keynote that will address these focus areas and methods to achieving the strategy. ...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 11:00 AM - 11:20 AM
The quest for the perfect common operating picture (COP) is one many commanders long for only to be sorely disappointed. Much of this disappointment and falling short stems from disconnected systems and knowledge management issues which separate data sources and analysis workflows. Thus, and sadly until present, most deeper analyses required to properly gauge risk and opportunity to ongoing missions remains a laborious and manual one executed by a large set of analysts siloed by classification level.
Even with the introduction of AI and ML capability to automate data analysis processes and identify meaningful relationships, application of this capability remains rudimentary....
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 11:00 AM - 1:00 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Wednesday, August 16, 11:25 AM - 12:25 PM
- Room: Georgia Cyber Center Auditorium
Watch recording
Delivery and design of persistent and episodic network capability from post/camp/station to the tactical edge. This panel will discuss organizational, integration, and design optimization to achieve Army of 2030. ...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 11:30 AM - 11:50 AM
Today, agencies are facing numerous challenges to securely access, analyze, and disseminate massive amounts of ever-growing data from a broad range of sensors and systems. Agencies struggle to securely curate geographically dispersed data repositories for mission-critical analysis, which hinders their ability to meet both the current and projected government stipulated requirements as well as achieve optimal mission results.
Current methods of moving data to disparate locations are hindered by latency as well as bandwidth limitations… stifling organization’s ability to meet their mission requirements and deliver results. To pave a future that heightens the capabilities and utilization of the tactical edge, organizations...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 12:00 PM - 1:15 PM
- Room: Oglethorpe Ballroom A-E
Watch recording
The panel will provide senior level perspective and stimulate thought provoking discussion on the role of Cyber, Signal, and Electronic Warfare in future Large Scale Combat Operations (LSCO) and Multi-Domain Operations (MDO). The panel will also address how prioritization of accelerated technology and capabilities impacts the Noncommissioned Officer (NCO) Corps, sets priorities, and helps identify resource challenges. ...
Speaker(s)
Tracks:
Wednesday, August 16, 1:30 PM - 2:15 PM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 1:30 PM - 4:30 PM
CLICK HERE for more details and to register. Note that both in-person and virtual attendance is available. In-person attendees must also register for TechNet Augusta.
Join CompTIA to gather insights on how AI/ML is used to augment human decision-making and facilitate effective incident response.
There’s an old adage about technology: “Any sufficiently advanced technology is indistinguishable from magic.” Well, it’s time to demystify some of the advanced technologies that we’re using every day. During this 3-hour learning experience, we will discuss:
• Protecting information in a Web 3.0, data fabric world
• Fostering productive levels of human / AI interaction
• How AI and automation...
...read more...
Speaker(s)
Tracks:
Wednesday, August 16, 2:30 PM - 3:30 PM
Smart Post and Base Connected Communities Cybersecurity refers to the measures taken to protect the critical infrastructure and sensitive information of a smart post/base from cyber-attacks. A smart post/base is an federal urban area that leverages technology, data, and connectivity to improve the quality of life for its residents, enhance sustainability, and create new economic opportunities.
However, the increased use of technology and interconnectedness also poses significant cybersecurity risks. Smart post/base cybersecurity must address a wide range of threats, including cyber-attacks on critical infrastructure such as power grids, transportation systems, water and sewage systems, and emergency response networks. Hackers could potentially...
...read more...
Speaker(s)
Tracks:
As the data-driven battlespace continues to evolve, the joint force must rapidly integrate new capabilities to adapt to emerging mission needs. The implementation of 5G technology will prove essential in future military operations. The digital battlespace will leverage the power of secure 5G technology to seamlessly connect the battlespace with advanced, mission-aware networks so our warfighters can be ready for the threat of tomorrow. Hear from industry and government leaders as they discuss the implications of this transformative technology and how it will be applied to military operations in the coming years.
CEU Credits: Approved for 1 GIAC CPE
Participation by DoD/Military...
...read more...
Speaker(s)
Tracks:
Wednesday, August 16, 2:45 PM - 3:15 PM
- Room: Georgia Cyber Center Auditorium
Watch recording...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 3:15 PM - 4:30 PM
- Room: Georgia Cyber Center Auditorium
Watch recording
As the landscape of warfare changes to include the expanding threat of cyber attack, the Army and the DOD have prioritized developing cyber capabilities in a cohesive way to reduce cost and redundancy while maintaining operational advantages through data driven technologies, maximizing strategic partnerships and minimizing stove piped solutions. The Army is realigning its Cyber acquisition portfolio to provide holistic and centralized management to support cyberspace operations to include offensive and defensive capabilities. This back-to-back session will open with senior program executive office leadership offering views on how a synergistic approach to delivering cyber capabilities maximizes opportunities. Our second...
...read more...
Speaker(s)
Tracks:
Wednesday, August 16, 4:00 PM - 5:00 PM
- Room: Oglethorpe Ballroom A-E
Watch recording
The U.S. Government has embarked on an endeavor to improve cyber security, including critical infrastructure by migrating to zero trust architecture with the deadline for executive departments and agencies to meet specific standards and objectives by the end of FY 2024.
OMB Memo M-22-09 states, The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, August 16, 5:00 PM - 6:30 PM
Please join us in the Riverwalk Hallway at the conclusion of the AFCEA IDEA Senior Cyber Leaders Panel on Moving Toward Zero Trust Cybersecurity Principles for a networking reception that also features a student poster show and cyber demonstration.
CLICK HERE for additional information on the Poster Show....
Tracks:
Wednesday, August 16, 6:00 PM - 9:00 PM
- Room: Salt & Marrow, Crowne Plaza, North Augusta
Tracks:
Thursday, August 17, 7:00 AM - 8:00 AM
- Room: Plaza Lobby & Riverwalk Hallway
Tracks:
Thursday, August 17, 7:00 AM - 5:30 PM
- Room: Olmstead Street Level Foyer
Thursday, August 17, 8:00 AM - 8:45 AM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Thursday, August 17, 8:30 AM - 11:00 AM
Thursday, August 17, 8:30 AM - 1:00 PM
Thursday, August 17, 8:50 AM - 9:50 AM
In this session, we will delve into leveraging indexed time over the timestamp of events within Enterprise Security (ES). By understanding the key advantages of indexed time, cybersecurity professionals can unlock superior performance, ensure comprehensive event analysis, and proactively implement this capability to bolster their security infrastructure today, without the need to wait for future updates.
Subtopics:
Unveiling the Power of Indexed Time
Unleashing Performance Benefits
Ensuring No Event Goes Unseen
Implementing Change Today
Listen to recording...
Speaker(s)
Tracks:
Thursday, August 17, 9:00 AM - 10:00 AM
On September 27, 2022, the Cyber Accreditation Body (Cyber AB) invited the Defense Management Contract Agency (DCMA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) as a special guest to their monthly Town Hall event. DIBCAC Supervisory IT Cybersecurity Specialist Nicholas DelRosso gave a presentation on the top 10 ‘Other than Satisfied’ requirements in which contractors, both large and small, in the Defense Industrial Base (DIB) have commonly failed.
My presentation, “CMMC: Unraveled”, will go into detail on common NIST SP 800-171 pitfalls, DoD Assessment Methodology pitfalls, DFARS 252.204-7012 pitfalls, top five 'Other than Satisfied' requirement pitfalls, and what your assessor will...
...read more...
Speaker(s)
Tracks:
The Office of the DoD Chief Information Officer recently published two critical initiatives: the 2023-2027 DoD Cyber Workforce Strategy and DoD Manual 8140.03. The strategy establishes the direction for unified management of the cyber workforce and outlines a roadmap for its advancement while DoDM 8140 changes the way that we qualify our workforce. Through the DoD 8140 Cyber Workforce Qualification Program, DoD is expanding the qualification program to roughly 225,000 military, civilian, and contractor positions by establishing foundational and residential qualification criteria for each DoD Cyber Workforce Framework work role. Together, the strategy and program will enable the DoD to...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Georgia Cyber Center Auditorium
Watch recording
Sarah Mullins, Product Lead supported by Gerry Lebel, Product Officer, for Computer Hardware Enterprise Software and Solutions (CHESS) will provide current status of the CHESS ITES-3S contract vehicle, to include contract performance and possible timelines of follow-on actions for ITES-4S. Ms. Mullins will be discussing lessons learned, market research strategy, and possible improvements in the next iteration of the contact. The program office would also like to use this session as an opportunity to collect feedback from industry on ways to help shape the new services procurement vehicle....
Speaker(s)
Tracks:
Handout(s)
Thursday, August 17, 9:00 AM - 1:00 PM
A critical aim of this conference is to expose local middle and high school students to information regarding cutting-edge technological advancements. Information presented at TechNet conference aligns with the Pathway to Cyber Security Systems curriculum, STEM, and Junior Reserve Officers’ Training Corps (JROTC). This event is an outlet for students to attend Cyber and STEM demonstrations and offer students an opportunity to participate in key activities.
8:30 - 9:00 am
Arrival
9:00 - 10:30 am
Students walk the Floor
10:30 - 10:45 am
Welcome/ CG and/or Distinguished Guest
10:45 - 11:30 am
Panel Discussion
11:30 - 12:00 pm
Lunch
12:00 - 12:25 pm
Guest Speaker
12:25 - 12:50 pm
Guest Speaker
12:50 - 1:00 pm
Closing...
...read more...
Speaker(s)
Handout(s)
Thursday, August 17, 10:00 AM - 11:15 AM
- Room: Oglethorpe Ballroom A-E
Watch recording
Each of these leaders and their commands have a critical role in Enabling a Data-Centric Army. It is imperative that there’s synchronization across these commands as the network is developed and built, operated, evaluated, and sustained.. This session will discuss respective roles and the synchronization entailed in Enabling a Data-Centric Army, including how JFHQ-DODIN drives unified action across the DoD to secure, operate, and defend the DoD Information Network....
Speaker(s)
Tracks:
Thursday, August 17, 10:30 AM - 11:30 AM
- Room: Georgia Cyber Center Auditorium
Watch recording
Intermittent connectivity, specialized communication protocols, real-time processing constraints, and a wide variety of component architectures complicates the continuous cybersecurity monitoring of systems in operation in the tactical environment. Members of the Army Operating Force, Generating Force, and Cyber Operating Force will discuss the cyber terrain and challenges associated with implementation of a sensing and monitoring strategy for tactical weapon systems. Members of the forces represented in the panel will detail how their perspectives are captured in a Reference Architecture for use in future Army Acquisition and Modernization Programs and how that Reference Architecture will benefit both Army Programs of...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 17, 11:00 AM - 1:00 PM
- Room: Olmstead Street Level Foyer & Courtyard
Tracks:
Thursday, August 17, 11:15 AM - 12:15 PM
In 2018, there were more than 31,000 cybersecurity incidents affecting government agencies. In 2019, the U.S. government accounted for 5.6 percent of data breaches and 2.1 percent of all exposed records. It is imperative the US Government secures citizens’ information and federal agencies must continue to deliver services, regardless of cyber-attacks seeking disruption of those services. Fortunately, significant strides have been made to ensure just that.
The Biden Administration’s budget request includes roughly $10.9 billion for civilian cybersecurity-related activities, which represents an 11% increase compared to 2022. To date, over a billion dollars has been awarded through NITAAC for cybersecurity solutions...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, August 17, 11:30 AM - 11:50 AM
This abstract provides an overview of the potential benefits and implications of integrating Cisco Soft client for Mobile with the Android Team Awareness Kit (ATAK) and Cisco Communications Manager (CUCM). The objective is to explore the advantages of this integration in enabling effective communication and collaboration in tactical edge environments.
The integration of Cisco’s soft client on ATAK with CUCM presents a unique opportunity for Army. By combining the capabilities of these platforms, users gain access to a comprehensive suite of communication tools, including voice, video, chat, presence, and file sharing.
One of the key advantages of this integration is the ability...
...read more...
Speaker(s)
Tracks:
Thursday, August 17, 12:00 PM - 12:20 PM
The QuProtectTM software is designed to protect data—commercial and government—from quantum and classical cybersecurity threats throughout the data lifecycle. Our end-to-end solution powers an easy transition to quantum-resilience to protect digital assets and data, wherever they reside on the network. We combine a robust QRNG with NIST-approved PQC algorithms to create the strongest PQC currently available. This combination is used by the orchestration platform to provide a high-bandwidth, low-latency symmetric communications solution compatible with both pre/non-quantum and quantum-enabled systems. In addition, this PQC capability can be deployed via software across all network devices to securely transport QRNG-enabled symmetric keys to...
...read more...
Speaker(s)
Tracks:
Thursday, August 17, 12:30 PM - 1:30 PM
- Room: Oglethorpe Ballroom A-E
Watch recording...
Speaker(s)
Tracks:
Thursday, August 17, 2:00 PM - 4:00 PM
During this session, representatives from industry, academia, and the federal government are invited to participate in a detailed discussion with Cyber CDID Army Capability Developers about the problem statements and desired capabilities that will be included in the Cyber Quest 2024 Broad Agency Announcement (BAA). The intent is to assist industry with refining their responses (whitepapers/quad charts) to the BAA. The BAA will be published on the beta.sam.gov website. Other key topics of discussion will include the technology selection process, timeline, industry participation requirements, etc.”
...
Tracks: